Home :: Install Services :: Installation of X-Cart security patch 2015-04-28

Installation of X-Cart security patch 2015-04-28

Installation of X-Cart security patch 2015-04-28
Domain
X-Cart version
$65.00
Quantity
Installation of X-Cart security patch 2015-04-28

AFFECTED VERSIONS:
All X-Cart versions from 4.0.19 through 4.7.1

SEVERITY:
High

IMPACT:
• XSS vulnerability on the order search page (4.7.0 and 4.7.1 only);
• XSS vulnerability on the registration page (versions 4.7.1 and earlier);
• XSS vulnerability for the Customer_Reviews/Advanced_Customer_Reviews modules (versions 4.7.1 and earlier);
• XSS Smarty vulnerability (versions 4.6.1 and earlier);
• XSS vulnerability for the Product_Configurator(Product Wizard) module (versions 4.6.1 and earlier);
• Posible SQL injection on the cart page (versions 4.7.1 and earlier);
• Hacker can gain full access to the store's Admin back end in some cases for Platinum/Pro editions (versions 4.6.4 and earlier);
• X-Cart Protected Mode does not work in some cases (versions 4.6.4 and earlier);

Multiple Product Page Templates for X-Cart
Multiple Product Page Templates for X-Cart
desc here
$0.00
Customer Review Management for X-cart
Customer Review Management for X-cart
desc here
$29.95
MAP Price mod for X-cart (minimum advertised price)
MAP Price mod for X-cart (minimum advertised price)
desc here
$39.95
Order Processing Made Easy
Order Processing Made Easy
desc here
$39.95
Printable Online Catalog for Xcart
Printable Online Catalog for Xcart
desc here
$69.95
X-cart Gold or Pro Install
X-cart Gold or Pro Install
desc here
$50.00
Custom Development
Custom Development
desc here
$0.00
Authorize.net DPM Module for X-cart (PA/DSS Compliant)
Authorize.net DPM Module for X-cart (PA/DSS Compliant)
desc here
$149.95
Customer Rewards for X-cart 5 (Reward Points and Discounts)
Customer Rewards for X-cart 5 (Reward Points and Discounts)
desc here
$125.00

Product rating

Customer Reviews

There have been no reviews for this product.

Add your review here

: *
: *
Type the characters you see in the picture:


*